PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffff950ea2fc31a8, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff8070ece3f32, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 8
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 9
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffff950ea2fc31a8
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8070ece3f32
BUGCHECK_P4: 2
READ_ADDRESS: fffff8070f2fa388: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
fffff8070f20f2a8: Unable to get Flags value from nt!KdVersionBlock
unable to get nt!MmSpecialPagesInUse
ffff950ea2fc31a8
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: atieclxx.exe
TRAP_FRAME: fffff2870cd4ef20 -- (.trap 0xfffff2870cd4ef20)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=000000008e4dd0ec rbx=0000000000000000 rcx=fffff2870cd4f140
rdx=fffff2870cd4f130 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8070ece3f32 rsp=fffff2870cd4f0b0 rbp=fffff2870cd4f130
r8=ffff970ea2f0fd80 r9=0000000000000000 r10=ffff950ea2fc3190
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
nt!PiDmCompareObjects+0x12:
fffff807`0ece3f32 413b4218 cmp eax,dword ptr [r10+18h] ds:ffff950e`a2fc31a8=????????
Resetting default scope
LOCK_ADDRESS: fffff8070f2449a0 -- (!locks fffff8070f2449a0)
Cannot get _ERESOURCE type
Resource @ nt!PiEngineLock (0xfffff8070f2449a0) Available
1 total locks
PNP_TRIAGE_DATA:
Lock address : 0xfffff8070f2449a0
Thread Count : 0
Thread address: 0x0000000000000000
Thread wait : 0x0
STACK_TEXT:
fffff287`0cd4ec78 fffff807`0ea35c1d : 00000000`00000050 ffff950e`a2fc31a8 00000000`00000000 fffff287`0cd4ef20 : nt!KeBugCheckEx
fffff287`0cd4ec80 fffff807`0e812ce0 : 00000000`00000000 00000000`00000000 fffff287`0cd4efa0 00000000`00000000 : nt!MiSystemFault+0x1ad4ed
fffff287`0cd4ed80 fffff807`0e9ebb1e : 00000000`00000000 00000000`02000001 fffff287`0cd4f650 00000000`00000000 : nt!MmAccessFault+0x400
fffff287`0cd4ef20 fffff807`0ece3f32 : 00000000`00000000 00000000`00000000 00000000`00000002 fffff807`0ec76856 : nt!KiPageFault+0x35e
fffff287`0cd4f0b0 fffff807`0e8d9d03 : 00000000`ffffffff 00000000`00000000 00000000`001a0018 ffff970e`ab8556d0 : nt!PiDmCompareObjects+0x12
fffff287`0cd4f0e0 fffff807`0ec7677c : 00000000`00000000 fffff807`0f243a20 ffff970e`ab8556d0 00000000`00000000 : nt!RtlLookupElementGenericTableAvl+0x43
fffff287`0cd4f110 fffff807`0ec766c5 : 00000000`02000001 ffff970e`ab8556d0 ffff970e`ab8556d0 00000000`00000000 : nt!PiDmLookupObject+0x70
fffff287`0cd4f1d0 fffff807`0ec7655a : fffff287`0cd4f680 fffff287`0cd4f2c8 00000000`00000001 00000000`00000000 : nt!PiDmGetObject+0x49
fffff287`0cd4f200 fffff807`0ec75e65 : fffff287`0cd4f680 fffff287`0cd4f311 00000000`00000000 fffff287`0cd4f648 : nt!PiDmObjectGetCachedObjectProperty+0x6a
fffff287`0cd4f270 fffff807`0ec755eb : 00000006`00000000 00000000`52504e50 fffff287`0cd4f520 00000000`00000d5c : nt!PiDmObjectGetCachedCmProperty+0xc9
fffff287`0cd4f360 fffff807`0ec2c113 : 00000000`000000f0 00000000`00000000 00000000`02000001 fffff287`0cd4f648 : nt!PiPnpRtlCmActionCallback+0xbb
fffff287`0cd4f4d0 fffff807`0ec2c514 : 00000000`00000000 fffff287`0cd4f6e0 fffff287`0cd4f918 00000000`00000000 : nt!_CmGetDeviceRegProp+0xaf
fffff287`0cd4f5e0 fffff807`0ec2c163 : 00000000`00000002 fffff807`0ec77317 fffff287`0cd4f801 fffff287`0cd4f890 : nt!_CmGetDeviceRegPropWorker+0x330
fffff287`0cd4f730 fffff807`0ecfb2b8 : 00000000`00000001 fffff287`0cd4fa68 00000000`00000000 fffff287`0cd4f898 : nt!_CmGetDeviceRegProp+0xff
fffff287`0cd4f840 fffff807`0ec74476 : fffff287`0cd4fa68 0000006f`395fec80 00000000`00000038 00000000`00000000 : nt!PiCMGetRegistryProperty+0x12c
fffff287`0cd4f8f0 fffff807`0ec74303 : fffff287`0cd4fa40 00000000`00000014 00000000`0047081b fffff807`0ebf8dce : nt!PiCMHandleIoctl+0x156
fffff287`0cd4f930 fffff807`0eceffca : 00000000`0047081b fffff807`0eceff60 00000000`00000000 fffff807`0e82671a : nt!PiCMFastIoDeviceDispatch+0x53
fffff287`0cd4f980 fffff807`0ec0df82 : 00000000`0047081b 00000000`00000000 00000000`00000000 ffffae87`9ccb9c80 : nt!PiDaFastIoDispatch+0x6a
fffff287`0cd4f9e0 fffff807`0ec0dbe6 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!IopXxxControlFile+0x382
fffff287`0cd4fb20 fffff807`0e9ef375 : fffff287`0cd4fc18 00000000`00000000 ffffae87`9cf85080 0000006f`395ff018 : nt!NtDeviceIoControlFile+0x56
fffff287`0cd4fb90 00007ffa`5f0cae74 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000006f`395feb78 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffa`5f0cae74
SYMBOL_NAME: nt!PiDmCompareObjects+12
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .thread ; .cxr ; kb
BUCKET_ID_FUNC_OFFSET: 12
FAILURE_BUCKET_ID: AV_R_INVALID_nt!PiDmCompareObjects
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {88694318-3f51-91c3-580c-916fcf2cca8f}
Followup: MachineOwner
---------
MEMORY_MANAGEMENT (1a)
# Any other values for parameter 1 must be individually examined.
Arguments:
Arg1: 0000000000061941, The subtype of the bugcheck.
Arg2: ffff880eec858280
Arg3: 0000000000000009
Arg4: fffffe8f88f01ee0
Debugging Details:
------------------
*** WARNING: Unable to verify timestamp for atikmdag.sys
*** WARNING: Unable to verify timestamp for win32k.sys
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 101
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 1a
BUGCHECK_P1: 61941
BUGCHECK_P2: ffff880eec858280
BUGCHECK_P3: 9
BUGCHECK_P4: fffffe8f88f01ee0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: Registry
STACK_TEXT:
fffffe8f`88f01d38 fffff807`5ec01fae : 00000000`0000001a 00000000`00061941 ffff880e`ec858280 00000000`00000009 : nt!KeBugCheckEx
fffffe8f`88f01d40 fffff807`5ebebb1e : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!MmAccessFault+0x1ef6ce
fffffe8f`88f01ee0 fffff807`5eed5912 : fffff807`5edeff34 00000000`00000011 00000000`000000e5 fffffe8f`00000000 : nt!KiPageFault+0x35e
fffffe8f`88f02078 fffff807`5edeff34 : 00000000`00000011 00000000`000000e5 fffffe8f`00000000 00000000`00000000 : nt!HvpGetCellPaged+0xa2
fffffe8f`88f02080 fffff807`5edf2b5a : 00000000`00000000 00000000`00000024 00000000`00000000 fffffe8f`88f02510 : nt!CmQueryValueKey+0x284
fffffe8f`88f021e0 fffff807`5ebef375 : ffff880e`00000000 00000000`000000a0 00000000`00000000 ffff880e`e8a00000 : nt!NtQueryValueKey+0x5ba
fffffe8f`88f024e0 fffff807`5ebe1880 : fffff807`5ee2c97a ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
fffffe8f`88f026e8 fffff807`5ee2c97a : ffff880e`f1ee3d50 fffffe8f`88f02870 00000000`00000000 fffffe8f`88f02760 : nt!KiServiceLinkage
fffffe8f`88f026f0 fffff807`5ef0c47e : ffff880e`fa4041f0 ffff9883`e86cf000 00000000`00000000 fffffe8f`88f029cc : nt!RtlpQueryRegistryValues+0x18a
fffffe8f`88f027d0 fffff807`6a55a696 : 00000000`00000000 ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 : nt!RtlQueryRegistryValuesEx+0xe
fffffe8f`88f02810 00000000`00000000 : ffff9883`e86cf000 00000000`00000000 ffff9883`e86cf000 00000000`00000000 : atikmdag+0x6a696
MODULE_NAME: hardware
IMAGE_NAME: hardware_ram
STACK_COMMAND: .thread ; .cxr ; kb
FAILURE_BUCKET_ID: 0x1a_61941_PAGE_TABLE_RESERVED_BITS_SET_IMAGE_hardware_ram
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {c6e5c6cf-692e-7852-5dc5-b74944540fc0}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000096, Exception code that caused the bugcheck
Arg2: fffff8032681ffe4, Address of the instruction which caused the bugcheck
Arg3: ffff9c00f577f920, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 4
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 5
Key : Analysis.Memory.CommitPeak.Mb
Value: 74
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000096
BUGCHECK_P2: fffff8032681ffe4
BUGCHECK_P3: ffff9c00f577f920
BUGCHECK_P4: 0
CONTEXT: ffff9c00f577f920 -- (.cxr 0xffff9c00f577f920)
rax=00000000bbffe173 rbx=0000000000000000 rcx=ffff9c00f57c0180
rdx=0000000000000000 rsi=0000000000000000 rdi=ffff878cc9f3ca10
rip=fffff8032681ffe4 rsp=ffffda83ac8377d8 rbp=ffff878ccef50080
r8=0000000000000002 r9=ffffda83ac837a70 r10=fffff8032681fec0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=ffffffffffffffff r15=ffff878cce27f000
iopl=0 nv up ei ng nz ac pe cy
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010293
nt!ExIsResourceAcquiredSharedLite+0x124:
fffff803`2681ffe4 0f22c3 mov cr0,rbx
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: dwm.exe
BAD_STACK_POINTER: ffff9c00f577f018
STACK_TEXT:
ffffda83`ac8377d8 ffff878c`ce27f000 : fffff803`2be5e2ea ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 : nt!ExIsResourceAcquiredSharedLite+0x124
ffffda83`ac837838 fffff803`2be5e2ea : ffff878c`ce27f000 ffffda83`ac837ae0 00000000`00000000 ffff878c`ce27f000 : 0xffff878c`ce27f000
ffffda83`ac837840 fffff803`2be80fd5 : ffffffff`ffffffff ffffda83`ac837ae0 ffff878c`ce27f000 ffff878c`ce27f000 : dxgkrnl!DXGADAPTER::AcquireCoreResourceShared+0x3a
ffffda83`ac8379e0 fffff803`2be80c8a : 00000215`9db96800 ffff878c`c9787860 00000000`000010ac fffff803`26bfb1ba : dxgkrnl!DxgkSetSyncRefreshCountWaitTargetInternal+0x325
ffffda83`ac837ba0 fffff803`269ef375 : 00000000`00000000 ffff878c`00000000 ffffda83`ac837c18 00000000`00000000 : dxgkrnl!DxgkSetSyncRefreshCountWaitTarget+0xca
ffffda83`ac837c00 00007ff9`81505984 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
0000007c`8577f6e8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`81505984
CHKIMG_EXTENSION: !chkimg -lo 50 -d !nt
fffff8032681ffd8 - nt!ExIsResourceAcquiredSharedLite+118
[ 6c:2c ]
1 error : !nt (fffff8032681ffd8)
MODULE_NAME: memory_corruption
IMAGE_NAME: memory_corruption
MEMORY_CORRUPTOR: ONE_BIT
STACK_COMMAND: .cxr 0xffff9c00f577f920 ; kb
FAILURE_BUCKET_ID: MEMORY_CORRUPTION_ONE_BIT
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {e3faf315-c3d0-81db-819a-6c43d23c63a7}
Followup: memory_corruption
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 0000000080000003, Exception code that caused the bugcheck
Arg2: fffff80240531633, Address of the instruction which caused the bugcheck
Arg3: ffff8880bf6a5a60, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : Analysis.CPU.Sec
Value: 3
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on DESKTOP-VFOM7MS
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.Sec
Value: 3
Key : Analysis.Memory.CommitPeak.Mb
Value: 69
Key : Analysis.System
Value: CreateObject
ADDITIONAL_XML: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: 80000003
BUGCHECK_P2: fffff80240531633
BUGCHECK_P3: ffff8880bf6a5a60
BUGCHECK_P4: 0
CONTEXT: ffff8880bf6a5a60 -- (.cxr 0xffff8880bf6a5a60)
rax=ffff8880bf6a6488 rbx=ffff8880bf6a7680 rcx=0000000000000001
rdx=ffff8880bf6a7680 rsi=ffff8880bf6a6c80 rdi=0000000000000001
rip=fffff80240531633 rsp=ffff8880bf6a6460 rbp=ffff8880bf6a6a70
r8=ffff8880bf6a6c80 r9=ffff8880bf6a6ac0 r10=ffff8880bf6a7448
r11=0000000000000000 r12=ffff8880bf6a79e0 r13=ffff8880bf6a7448
r14=ffff8880bf6a6ac0 r15=ffff8880bf6a7448
iopl=0 nv up ei pl nz na pe nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00000202
nt!KeCheckStackAndTargetAddress+0x53:
fffff802`40531633 cc int 3
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: steam.exe
TRAP_FRAME: ffff8880bf6a74f0 -- (.trap 0xffff8880bf6a74f0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000021 rbx=0000000000000000 rcx=00000000000000f2
rdx=00000000000000f2 rsi=0000000000000000 rdi=0000000000000000
rip=0000000000000001 rsp=ffff8880bf6a7680 rbp=0000000000000001
r8=0000000000000000 r9=0000000000000041 r10=0000000000100200
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
00000000`00000001 ?? ???
Resetting default scope
STACK_TEXT:
ffff8880`bf6a6460 fffff802`405b90fb : fffff802`408db2db fffff802`40307df0 00000000`00000000 00000000`00000000 : nt!KeCheckStackAndTargetAddress+0x53
ffff8880`bf6a6490 fffff802`405e68df : fffff802`40307df0 ffff8880`bf6a6a70 fffff802`405b90c0 00000000`00000000 : nt!_C_specific_handler+0x3b
ffff8880`bf6a6500 fffff802`40432fb7 : ffff8880`bf6a6a70 00000000`00000000 ffff8880`bf6a79e0 fffff802`408db2db : nt!RtlpExecuteHandlerForException+0xf
ffff8880`bf6a6530 fffff802`4047b226 : ffff8880`bf6a7448 ffff8880`bf6a7180 ffff8880`bf6a7448 ffff9a8c`7c11ec40 : nt!RtlDispatchException+0x297
ffff8880`bf6a6c50 fffff802`405efa6c : ffff8880`bf6a7570 00000000`00001000 ffff8880`bf6a74f0 ffff8000`00000000 : nt!KiDispatchException+0x186
ffff8880`bf6a7310 fffff802`405ebc03 : 00000000`00000000 00000000`00000000 00000000`00000001 00000000`00000258 : nt!KiExceptionDispatch+0x12c
ffff8880`bf6a74f0 00000000`00000001 : ffff9a8c`7c4ac340 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e : nt!KiPageFault+0x443
ffff8880`bf6a7680 ffff9a8c`7c4ac340 : 00000000`00000041 ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff : 0x1
ffff8880`bf6a7688 00000000`00000041 : ffff8880`bf6a77d0 fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 : 0xffff9a8c`7c4ac340
ffff8880`bf6a7690 ffff8880`bf6a77d0 : fffff802`407eb74e ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 : 0x41
ffff8880`bf6a7698 fffff802`407eb74e : ffffffff`ffffffff 00000000`00000003 ffff8880`bf6a77d0 00000000`00000041 : 0xffff8880`bf6a77d0
ffff8880`bf6a76a0 fffff802`4041bfd9 : 00000000`00000041 ffff8880`bf6a77d0 00000000`033eefff 00000000`033ae000 : nt!MiChargeFullProcessCommitment+0x9e
ffff8880`bf6a76d0 fffff802`407eaed4 : ffff9a8c`7c11ec40 00000000`033ae000 00000000`00041001 00000000`00000002 : nt!MiCommitExistingVad+0x1c9
ffff8880`bf6a7860 fffff802`408db2db : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`0050e070 : nt!MiAllocateVirtualMemory+0x2a4
ffff8880`bf6a79e0 fffff802`405ef375 : ffffffff`ffffffff ffff9a8c`7b97f080 00000000`00000000 00000000`0050e018 : nt!NtAllocateVirtualMemory+0x1ab
ffff8880`bf6a7b90 00007ffe`3fb4b094 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25
00000000`0050dff8 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ffe`3fb4b094
SYMBOL_NAME: nt!KeCheckStackAndTargetAddress+53
MODULE_NAME: nt
IMAGE_NAME: ntkrnlmp.exe
IMAGE_VERSION: 10.0.19041.264
STACK_COMMAND: .cxr 0xffff8880bf6a5a60 ; kb
BUCKET_ID_FUNC_OFFSET: 53
FAILURE_BUCKET_ID: 0x3B_80000003_nt!KeCheckStackAndTargetAddress
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {3c8e413e-71c2-0077-9ab0-f2dd61308472}
Followup: MachineOwner
---------